![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Applications of computing > General
After a brief introduction to the topic of business process modeling, the book offers a quick-start into model-based business process engineering. After that, the foundations of the modeling languages used are conveyed. Meaningful examples are in the foreground - each of the underlying formalisms is treated only as far as needed. Next the Horus Method is described in detail. The book defines a sequence of activities which finally leads to the creation of a complete business process model. The Horus Method, incidentally, is not bound to the use of the Horus software tools. It can be used with other tools or, if necessary, be used even without tool support. Important application fields of business process engineering are described, where the spectrum ranges from business process reengineering to the development and implementation of information systems. The book concludes with an outlook on the future of business process engineering and highlights current research activities in the area.
"Computer Science and Convergence"is proceedings of the 3rd FTRA International Conference on Computer Science and its Applications (CSA-11) and The 2011 FTRA World Convergence Conference (FTRA WCC 2011). The topics of CSA and WCC cover the current hot topics satisfying the world-wide ever-changing needs. CSA-11 will be the most comprehensive conference focused on the various aspects of advances in computer science and its applicationsand will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of CSA. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in CSA. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. The main scope of CSA-11 is as follows: - Mobile and ubiquitous computing WCC-11 is a major conference for scientists, engineers, and practitioners throughout the world to present the latest research, results, ideas, developments and applications in all areas of convergence technologies. The main scope of WCC-11 is as follows: - Cryptography and Security for Converged environments -
Wireless sensor network for Converged environments
This book deals with the problem of finding suitable languages that can represent specific classes of Petri nets, the most studied and widely accepted model for distributed systems. Hence, the contribution of this book amounts to the alphabetization of some classes of distributed systems. The book also suggests the need for a generalization of Turing computability theory. It is important for graduate students and researchers engaged with the concurrent semantics of distributed communicating systems. The author assumes some prior knowledge of formal languages and theoretical computer science.
"The book of nature is written in the language of mathematics "-- "Galileo Galilei" How is it possible to predict weather patterns for tomorrow, with access solely to today s weather data? And how is it possible to predict the aerodynamic behavior of an aircraft that has yet to be built? The answer is computer simulations based on mathematical models sets of equations that describe the underlying physical properties. However, these equations are usually much too complicated to solve, either by the smartest mathematician or the largest supercomputer. This problem is overcome by constructing an approximation: a numerical model with a simpler structure can be translated into a program that tells the computer how to carry out the simulation. This book conveys the fundamentals of mathematical models, numerical methods and algorithms. Opening with a tutorial on mathematical models and analysis, it proceeds to introduce the most important classes of numerical methods, with finite element, finite difference and spectral methods as central tools. The concluding section describes applications in physics and engineering, including wave propagation, heat conduction and fluid dynamics. Also covered are the principles of computers and programming, including MATLAB(r).
Modelling for Business Improvement contains the proceedings of the First International Conference on Process Modelling and Process Management (MMEP 2010) held in Cambridge, England, in March 2010. It contains contributions from an international group of leading researchers in the fields of process modelling and process management. This conference will showcase recent trends in the modelling and management of engineering processes, explore potential synergies between different modelling approaches, gather and discuss future challenges for the management of engineering processes and discuss future research areas and topics. Modelling for Business Improvement is divided into three main parts: theoretical foundation of modelling and management of engineering processes, and achievements in theory; experiences from management practice using various modelling methods and tools, and their future challenges; and, new perspectives on modelling methods, techniques and tools. Based on the latest achievements in this and related fields, the editors aim to landmark the research map for modelling and management of engineering processes for 2020.
The First International Conference on Computational Methods (ICCM04), organized by the department of Mechanical Engineering, National University of Singapore, was held in Singapore, December 15-17, 2004, with great success. This conference proceedings contains some 290 papers from more than 30 countries/regions. The papers cover a broad range of topics such as meshfree particle methods, Generalized FE and Extended FE methods, inverse analysis and optimization methods. Computational methods for geomechanics, machine learning, vibration, shock, impact, health monitoring, material modeling, fracture and damage mechanics, multi-physics and multi-scales simulation, sports and environments are also included. All the papers are pre-reviewed before they are accepted for publication in this proceedings. The proceedings will provide an informative, timely and invaluable resource for engineers and scientists working in the important areas of computational methods.
This book contains articles written by experts on a wide range of topics that are associated with the analysis and management of biological information at the molecular level. It contains chapters on RNA and protein structure analysis, DNA computing, sequence mapping, genome comparison, gene expression data mining, metabolic network modeling, and phyloinformatics. The important work of some representative researchers in bioinformatics is brought together for the first time in one volume. The topic is treated in depth and is related to, where applicable, other emerging technologies such as data mining and visualization. The goal of the book is to introduce readers to the principle techniques of bioinformatics in the hope that they will build on them to make new discoveries of their own. Contents: Exploring RNA Intermediate Conformations with the Massively Parallel Genetic Algorithm; Introduction to Self-Assembling DNA Nanostructures for Computation and Nanofabrication; Mapping Sequence to Rice FPC; Graph Theoretic Sequence Clustering Algorithms and their Applications to Genome Comparison; The Protein Information Resource for Functional Genomics and Proteomics; High-Grade Ore for Data Mining in 3D Structures; Protein Classification: A Geometric Hashing Approach; Interrelated Clustering: An Approach for Gene Expression Data Analysis; Creating Metabolic Network Models Using Text Mining and Expert Knowledge; Phyloinformatics and Tree Networks. Readership: Molecular biologists who rely on computers and mathematical scientists with interests in biology.
Decision-aiding software, the underpinning of computer-aided judicial analysis, can facilitate the prediction of how cases are likely to be decided, prescribe decisions that should be reached in such cases, and help administrate more efficiently the court process. It can do so, says Nagel, by listing past cases on each row of a spreadsheet matrix, by listing predictive criteria in the columns, and in general by showing for each factual element the estimated probability of winning a case. The software aggregates the information available and deduces likely outcomes. But it can also prescribe judicial decisions by listing alternatives in the rows, the goals to be achieved in the columns, and by showing relations between alternatives in the cells. By similar means decision-aiding software can also help perform administrative tasks, such as rationally assigning judges or other personnel to cases, and by sequencing cases to reduce the time consumed by each case. In Part I, Nagel provides an overview of computer-aided analysis and the role of decision-aiding software in the legal process. In the second part he deals with judicial prediction from prior cases and from present facts; and in the third part he emphasizes the prescribing role of judges, particularly in deciding the rules that ought to be applied in civil and criminal procedures. Nagel also covers computer-aided mediation and provides a new perspective on judicial decisions. Then, in Part IV, he treats at length the process of judicial administration and how to improve its efficiency. Of particular interest to court personnel will be the benefits to be derived from reducing delays and in the docketing and sequencing of cases.
This edited book presents scientific results of the 14th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2015) which was held on June 28 - July 1, 2015 in Las Vegas, USA. The aim of this conference was to bring together researchers and scientists, businessmen and entrepreneurs, teachers, engineers, computer users, and students to discuss the numerous fields of computer science and to share their experiences and exchange new ideas and information in a meaningful way. Research results about all aspects (theory, applications and tools) of computer and information science, and to discuss the practical challenges encountered along the way and the solutions adopted to solve them.
Prepare for success on the IAPP CIPP/US exam and further your career in privacy with this effective study guide - now includes a downloadable supplement to get you up to date on the 2022 CIPP exam! Information privacy has become a critical and central concern for small and large businesses across the United States. At the same time, the demand for talented professionals able to navigate the increasingly complex web of legislation and regulation regarding privacy continues to increase. Written from the ground up to prepare you for the United States version of the Certified Information Privacy Professional (CIPP) exam, Sybex's IAPP CIPP/US Certified Information Privacy Professional Study Guide also readies you for success in the rapidly growing privacy field. You'll efficiently and effectively prepare for the exam with online practice tests and flashcards as well as a digital glossary. The concise and easy-to-follow instruction contained in the IAPP/CIPP Study Guide covers every aspect of the CIPP/US exam, including the legal environment, regulatory enforcement, information management, private sector data collection, law enforcement and national security, workplace privacy and state privacy law, and international privacy regulation. Provides the information you need to gain a unique and sought-after certification that allows you to fully understand the privacy framework in the US Fully updated to prepare you to advise organizations on the current legal limits of public and private sector data collection and use Includes access to the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Perfect for anyone considering a career in privacy or preparing to tackle the challenging IAPP CIPP exam as the next step to advance an existing privacy role, the IAPP CIPP/US Certified Information Privacy Professional Study Guide offers you an invaluable head start for success on the exam and in your career as an in-demand privacy professional.
Biological and biomedical studies have entered a new era over the past two decades thanks to the wide use of mathematical models and computational approaches. A booming of computational biology, which sheerly was a theoretician's fantasy twenty years ago, has become a reality. Obsession with computational biology and theoretical approaches is evidenced in articles hailing the arrival of what are va- ously called quantitative biology, bioinformatics, theoretical biology, and systems biology. New technologies and data resources in genetics, such as the International HapMap project, enable large-scale studies, such as genome-wide association st- ies, which could potentially identify most common genetic variants as well as rare variants of the human DNA that may alter individual's susceptibility to disease and the response to medical treatment. Meanwhile the multi-electrode recording from behaving animals makes it feasible to control the animal mental activity, which could potentially lead to the development of useful brain-machine interfaces. - bracing the sheer volume of genetic, genomic, and other type of data, an essential approach is, ?rst of all, to avoid drowning the true signal in the data. It has been witnessed that theoretical approach to biology has emerged as a powerful and st- ulating research paradigm in biological studies, which in turn leads to a new - search paradigm in mathematics, physics, and computer science and moves forward with the interplays among experimental studies and outcomes, simulation studies, and theoretical investigations.
It is clear that computation is playing an increasingly prominent role in the development of mathematics, as well as in the natural and social sciences. The work of Stephen Wolfram over the last several decades has been a salient part in this phenomenon helping founding the field of Complex Systems, with many of his constructs and ideas incorporated in his book A New Kind of Science (ANKS) becoming part of the scientific discourse and general academic knowledge--from the now established Elementary Cellular Automata to the unconventional concept of mining the Computational Universe, from today's widespread Wolfram's Behavioural Classification to his principles of Irreducibility and Computational Equivalence. This volume, with a Foreword by Gregory Chaitin and an Afterword by Cris Calude, covers these and other topics related to or motivated by Wolfram's seminal ideas, reporting on research undertaken in the decade following the publication of Wolfram's NKS book. Featuring 39 authors, its 23 contributions are organized into seven parts: Mechanisms in Programs & Nature Systems Based on Numbers & Simple Programs Social and Biological Systems & Technology Fundamental Physics The Behavior of Systems & the Notion of Computation Irreducibility & Computational Equivalence Reflections and Philosophical Implications.
* Draws on work across multiple disciplines, from astrobiology and physics to linguistics and the social sciences, making it appealing to graduates from a wide variety of fields. * The first accessible introduction into the important work of philosopher Howard Pattee. * Aims to equip readers with new approaches to simple and complex systems theory to take into any respective discipline.
This up-to-date Mike Meyers exam guide delivers complete coverage of every topic on the N10-008 version of the CompTIA Network+ Certification exam Take the latest version of the CompTIA Network+ Certification exam with complete confidence using the hands-on information contained in this fully updated self-study system. You will get clear instruction and real-world examples from training expert and bestselling author Mike Meyers along with hundreds of accurate practice questions. CompTIA Network+ Certification All-in-One Exam Guide, Eighth Edition (Exam N10-008) features a sample of interactive hands-on labs and simulations and video training from Mike Meyers. A valuable pre-assessment test enables you to gauge your familiarity with the test's objectives and tailor an effective course for study. Fulfilling the promise of the All-in-One series, this comprehensive reference serves both as a study tool and a valuable on-the-job reference that will serve you well beyond the exam. * 100% coverage of every objective for the CompTIA Network+ Certification exam * Written by CompTIA training and certification guru Mike Meyers * Online content includes 100 practice questions in the Total Tester exam engine, 22 interactive labs and simulations, more than an hour of training videos selected from Mike's full video training course, and a collection of Mike's favorite freeware and shareware utilities
Studying narratives is often the best way to gain a good understanding of how various aspects of human information are organized and integrated-the narrator employs specific informational methods to build the whole structure of a narrative through combining temporally constructed events in light of an array of relationships to the narratee and these methods reveal the interaction of the rational and the sensitive aspects of human information. Computational and Cognitive Approaches to Narratology discusses issues of narrative-related information and communication technologies, cognitive mechanism and analyses, and theoretical perspectives on narratives and the story generation process. Focusing on emerging research as well as applications in a variety of fields including marketing, philosophy, psychology, art, and literature, this timely publication is an essential reference source for researchers, professionals, and graduate students in various information technology, cognitive studies, design, and creative fields.
In the last decade, there have been an increasing convergence of interest and methods between theoretical physics and fields as diverse as probability, machine learning, optimization and compressed sensing. In particular, many theoretical and applied works in statistical physics and computer science have relied on the use of message passing algorithms and their connection to statistical physics of spin glasses. The aim of this book, especially adapted to PhD students, post-docs, and young researchers, is to present the background necessary for entering this fast developing field.
1. Paradigmatische Konstruktionen.- Unser heutiges Wirklichkeits-Verstandnis.- Wirklichkeits-Pluralismus.- Entstehen von Wirklichkeiten.- Lebendiger Vollzug von Wirklichkeiten.- Fruchtbare Vielfalt.- Simultane und sequenzielle Wirklichkeiten in der Lebenswelt.- Okkulte Wirklichkeiten und andere Geheimlehren.- Gefahrliche Verabsolutierungen.- 2. Farbe als Wirklichkeit.- Goethes Farbenlehre.- Physiologische Farben.- Farblose Bilder.- Farbige Bilder.- Farbige Schatten.- Schwach wirkende Lichter, subjektive Hoefe, pathologische Farben.- Physische Farben.- Dioptrische Farben der 1. Klasse.- Dioptrische Farben der 2. Klasse.- Das Phanomen der Refraktion.- Refraktion ohne Farberscheinung.- Farberscheinungen bei Linsen.- Grundzuge refraktionsbedingter Farberscheinungen.- Farberscheinungen bei Prismen.- Farberscheinungen an gro?en und kleinen wei?en Bildern.- Farberscheinungen an gro en und kleinen schwarzen Bildern.- Farberscheinungen sind nie statisch.- Zum Wesen von Licht und Farbe aus Goetheseher Sieht.- Wichtige, ganz allgemeine Begriffe.- Die Polaritat.- Die Steigerung.- Phanomen und Urphanomen.- Farbenkreis und Spektrogramm.- Newtons Farben des Liehts.- Newtons Experimente.- 1. Experiment.- 2. Experiment.- 3. Experiment.- 4. Experiment.- 5. Experiment.- Das We sen der Farbe.- Einfache Farbmetrik.- Das Auge.- Der Spektralfarbenzug.- Zwei Wirklichkeiten.- 3. Heilkundliche Wirkliehkeiten.- Chinesische Lebenswirkliehkeit.- Das Schafgarbenorakel.- Das Yin-Yang-Prinzip.- Shen und Kuei. Qi und Jing.- Die funf Elemente.- Chinesische Medizin.- Yin-Yang-Theorie.- Lebenssubstanzen.- Qi.- Blut und Safte.- Jing.- Shen.- Die Funktion der inneren Organe.- Die Leitbahnen oder die Meridiane.- Wie kommt es zur Disharmonie?.- Die Sechs UEbel.- Die sieben Emotionen.- Die Lebensweise.- Das Dishannoniemuster.- Ein Beispiel.- Ein simultanes Massenphanomen.- 4. Mikro-Wirklichkeiten.- Spiele als Mikro-Wirklichkeiten.- Definition des Spielbegriffes.- Die Vielfalt der Spiele.- Mikro-Wirklichkeiten im weiteren Sinn.- 5. Wirklichkeit eines Verbrechens.- Ein Beispiel aus der japanischen Literatur.- Eine neue Erzlihlung des Rashomon-Textes.- Die Aussage eines Holzfallers.- Die Aussage eines Wandergeistlichen.- Die Aussage eines Gerichtsdieners.- Die Aussage einer alten Frau.- Das Gestandnis des Raubers.- Die Aussage eines Gefahrten des Raubers.- Bericht eines Waldbewohners.- Die Beichte der Ehefrau in einem Kloster.- Der Geist des Toten spricht durch den Mund einer Wahrsagerin.- Vergewaltigung und Tod.- 6. Verwandlung von Wirklichkeiten.- Siddhartha. Eine indische Dichtung.- Die Brahmana-Welt.- Die Samana-Welt.- Die Buddha-Welt.- Die Menschenkinder-Welt.- Am Flu?.- 7. Magie und Damonie.- Weissagung.- Wirksarnkeit von Weissagungen.- Kassandra.- Die delphische Seherin.- Andere Fonnen der Weissagung.- Zauber und Damonen.- Magische Praktikep in der Volkskunst.- Magische Praktiken' der Antike.- Kirke verzaubert Manner.- Hexen morden Knaben.- Fluche verandern das Leben.- Fluchtafeln.- Ovids Ibis.- Schamanen.- Spuren des Schamanismus in der Neuzeit.- Antike Schamanen.- Orpheus.- Pythagoras.- Empedokles.- Vespasian.- Nekromantie.- Die Macht des Okkulten.- Magie und Damonie als Wirklichkeit?.- 8. Totalitare Wirklichkeiten.- Wahnsinn als totalitare Wirklichkeit.- Das Entstehen eines Wahnes.- Der logische Zusammenhang von Wahnideen.- Die weitgehende Unkorrigierbarkeit.- Gro?en und Verfolgungswahn.- Groe?enwahn.- Verfolgungswahn.- Paranoia erotica.- Eifersuchtsparanoia.- Religioeser Wahn mit erotischer Komponente.- Kraftentfaltung in totalitaren Wirklichkeiten.- Der Kriegstanz der Maori.- Atomare Bedrohung.- Extremsituationen in totalitaren Wirklichkeiten.- Der Tag des Blutes.- Der spontane Volkszorn.- Entgleisung einer Hochtechnologie.- Die Eigendynamik und die Hilflosigkeit.- 9. Chance und Bedrangnis.- Wirklichkeit ist eine Konstruktion. Der Urgrund ist ohne Eigenschaften.- Wirklichkeiten als Gewordenes.- Die Lebenswirklichkeit als Ausgangsbasi
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments, indeed - ciety itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. This book, Critical Infrastructure Protection III, is the third volume in the annualseriesproducedbyIFIP WorkingGroup11.10onCriticalInfrastructure Protection, an active international community of scientists, engineers, prac- tioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastructure protection. Also, it highlights the importance of weaving s- ence, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This volume contains seventeen edited papers from the Third Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure P- tection, held at Dartmouth College, Hanover, New Hampshire, March 23-25, 2009. The papers were refereed by members of IFIP Working Group 11.10 and other internationally-recognized experts in critical infrastructure protection.
"Distributed Programming: Theory and Practice" presents a practical and rigorous method to develop distributed programs that correctly implement their specifications. The method also covers how to write specifications and how to use them. Numerous examples such as bounded buffers, distributed locks, message-passing services, and distributed termination detection illustrate the method. Larger examples include data transfer protocols, distributed shared memory, and TCP network sockets. "Distributed Programming: Theory and Practice" bridges the gap between books that focus on specific concurrent programming languages and books that focus on distributed algorithms. Programs are written in a "real-life" programming notation, along the lines of Java and Python with explicit instantiation of threads and programs.Students and programmers will see these as programs and not "merely" algorithms in pseudo-code. The programs implement interesting algorithms and solve problems that are large enough to serve as projects in programming classes and software engineering classes. Exercises and examples are included at the end of each chapter with on-line access to the solutions. "Distributed Programming: Theory and Practice "is designed as an advanced-level text book for students in computer science and electrical engineering. Programmers, software engineers and researchers working in this field will also find this book useful." |
![]() ![]() You may like...
Spectroscopy and Dynamics of Collective…
Baldassare Di Bartolo
Hardcover
R2,710
Discovery Miles 27 100
Teaching Strategies For Quality Teaching…
Roy Killen, Annemarie Hattingh
Paperback
R164
Discovery Miles 1 640
Teaching life skills in the Foundation…
Mariana Naude, Corinne Meier
Paperback
![]() R668 Discovery Miles 6 680
Technology CAPS - Grade 7 Teacher's…
F. Clitheroe, A. Goosen, …
Paperback
R296
Discovery Miles 2 960
Theory Of Thermoluminescence And Related…
Reuven. Chen, Stephen W.S. McKeever
Hardcover
R3,186
Discovery Miles 31 860
Exact Methods in Low-dimensional…
Jesper Jacobsen, Stephane Ouvry, …
Hardcover
R2,162
Discovery Miles 21 620
|